GSA seeks help in tracking sensitive info

GSA RFI for tracking sensitive data extracts

More than a year after the Office of Management and Budget required agencies to manage, track and erase personal information extracted from databases, the General Services Administration is asking industry for suggestions on how to accomplish that goal.

In a request for information issued July 17, GSA, on behalf of OMB, asked vendors to submit software and system ideas that meet the Bush administration’s goal. OMB had originally required agencies to comply with the mandate within 45 days. But more than a year later, few, if any, agencies have done so.

Experts say the requirement to log data extracts is the most difficult to complete. They say agencies need to know what sensitive data is in a database before deciding how to log it. Others say analyzing thousands of daily logs is the biggest challenge.

Despite those challenges, OMB expects agencies to comply with the mandate, and GSA’s RFI will help agencies know what is available from industry.

In the RFI, GSA asks vendors to describe their approaches, practices and capabilities for providing the services and whether their software must be customized to meet agencies’ needs.

GSA detailed 19 high-level objectives and six other supplemental goals in the RFI.

Among them are the ability to:
  • Identify or tag and log sensitive data that is removed from secure databases.
  • Manage various electronic formats, including database extracts, images, PDF files and other documents.
  • Log, track and report sensitive information for pending distribution, such as e-mail messages, instant messages and Web postings.
  • Manage sensitive data to determine any reconfiguration either by converting or by dissecting and infusing data from one format or document type to another.
  • Automatically alert agency officials when sensitive data exists 90 days after it is no longer needed.
  • Automate the proactive erasure or relocation of sensitive data.
  • Provide proactive scanning of network segments or specific nodes for sensitive data creation, storage and compliance with time-based erasure, relocation or archival policies.
  • Track and report when sensitive data is written to mobile storage and media devices.
GSA also described the potential components of a system, which include a monitoring appliance, a monitoring application, a management console and a scanning appliance.

Responses are due Aug. 13.

Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.